LevelOne AMG-2000 User Manual page 155

Ap management gateway
Hide thumbs Also See for AMG-2000:
Table of Contents

Advertisement

Encryption key
An alphanumeric (letters and/or numbers) series that enables data to be encrypted and then decrypted so it can be
safely shared among members of a network. WEP uses an encryption key that automatically encrypts outgoing
wireless data. On the receiving side, the same encryption key enables the computer to automatically decrypt the
information so it can be read.
ESSID
The identifying name of an 802.11 wireless network. When you specify your correct ESSID in your client setup you
ensure that you connect to your wireless network rather than another network in range. (See SSID.) The ESSID can
be called by different terms, such as Network Name, Preferred Network, SSID or Wireless LAN Service Area.
Ethernet
International standard networking technology for wired implementations. Basic 10BaseT networks offer a bandwidth
of about 10 Mbps. Fast Ethernet (100 Mbps) and Gigabit Ethernet (1000 Mbps) are becoming popular.
Firewall
A system that secures a network and prevents access by unauthorized users. Firewalls can be software, hardware
or a combination of both. Firewalls can prevent unrestricted access into a network, as well as restrict data from
flowing out of a network.
Firmware
1. In network devices, the program that runs the device.
2. Program loaded into read-only memory (ROM) or programmable read-only memory (PROM) that cannot be
altered by end-users.
Fragmentation
Breaking a packet into smaller units when transmitting over a network medium that cannot support the original size
of the packet.
FTP
File Transfer Protocol. A standard protocol for sending files between computers over a TCP/IP network and the
Internet.
Full Duplex
The ability of a networking device to receive and transmit data simultaneously.
Gateway
In the wireless world, a gateway is an access point with additional software capabilities such as providing NAT and
DHCP. Gateways may also provide VPN support, roaming, firewalls, various levels of security, etc.
152

Advertisement

Table of Contents
loading

Table of Contents